mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 19:33:37 +00:00
configure update
This commit is contained in:
@ -14,7 +14,7 @@ To configure BitLocker, you can use one of the following options:
|
||||
- [Monitor device encryption with Intune](/mem/intune/protect/encryption-monitor)
|
||||
- [Use compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started)
|
||||
- Group policy (GPO): this option can be used for devices that are joined to an Active Directory domain and aren't managed by a device management solution. Group policy can also be used for devices that aren't joined to an Active Directory domain, using the local group policy editor
|
||||
- Microsoft Configuration Manager: this option can be used for devices that are managed by Microsoft Configuration Manager using the BitLocker management agent. To learn more about options to configure BitLocker via Microsoft Configuration Manager, see [Deploy BitLocker management](/mem/configmgr/protect/deploy-use/bitlocker/deploy-management-agent).
|
||||
- Microsoft Configuration Manager: this option can be used for devices that are managed by Microsoft Configuration Manager using the BitLocker management agent. To learn more about options to configure BitLocker via Microsoft Configuration Manager, see [Deploy BitLocker management](/mem/configmgr/protect/deploy-use/bitlocker/deploy-management-agent)
|
||||
|
||||
> [!NOTE]
|
||||
> Windows Server doesn't support the configuration of BitLocker using CSP or Microsoft Configuration Manager. Use GPO instead.
|
||||
|
@ -10,83 +10,6 @@ ms.date: 09/29/2023
|
||||
|
||||
# Manage BitLocker recovery passwords
|
||||
|
||||
## Reset recovery password
|
||||
|
||||
It's recommended to invalidate a recovery password after its use. In following example, all recovery passwords are removed from the OS drive
|
||||
|
||||
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
||||
|
||||
#### Remove all recovery passwords for the OS volume
|
||||
|
||||
```PowerShell
|
||||
(Get-BitLockerVolume -MountPoint $env:SystemDrive).KeyProtector | `
|
||||
where-object {$_.KeyProtectorType -eq 'RecoveryPassword'} | `
|
||||
Remove-BitLockerKeyProtector -MountPoint $env:SystemDrive
|
||||
```
|
||||
|
||||
#### Add a BitLocker recovery password protector for the OS volume
|
||||
|
||||
```PowerShell
|
||||
Add-BitLockerKeyProtector -MountPoint $env:SystemDrive -RecoveryPasswordProtector
|
||||
```
|
||||
|
||||
#### Obtain the ID of the new recovery password
|
||||
|
||||
```PowerShell
|
||||
(Get-BitLockerVolume -mountpoint $env:SystemDrive).KeyProtector | where-object {$_.KeyProtectorType -eq 'RecoveryPassword'} | ft KeyProtectorId,RecoveryPassword
|
||||
```
|
||||
|
||||
Copy the ID of the recovery password from the output.
|
||||
|
||||
#### Backup the BitLocker recovery password to Microsoft Entra ID
|
||||
|
||||
Using the GUID from the previous step, replace the `{ID}` in the following command:
|
||||
|
||||
```PowerShell
|
||||
BackuptoAAD-BitLockerKeyProtector -MountPoint $env:SystemDrive -KeyProtectorId "{ID}"
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> The braces `{}` must be included in the ID string.
|
||||
|
||||
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
||||
|
||||
`manage-bde.exe` can be used to remove the old recovery password and add a new recovery password. The procedure identifies the command and the syntax for this method.
|
||||
|
||||
#### Remove previous recovery passwords for the OS volume
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -delete C: -type RecoveryPassword
|
||||
```
|
||||
|
||||
#### Add the new recovery password for the OS volume
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -add C: -RecoveryPassword
|
||||
```
|
||||
|
||||
#### Obtain the ID of the new recovery password
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -get C: -Type RecoveryPassword
|
||||
```
|
||||
|
||||
Copy the ID of the recovery password from the output.
|
||||
|
||||
#### Backup the new recovery password to AD DS
|
||||
|
||||
> [!NOTE]
|
||||
>This step is not required if the policy setting [Choose how BitLocker-protected operating system drives can be recovered](configure.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) is configured to **Require BitLocker backup to AD DS**.
|
||||
|
||||
Using the ID from the previous step, replace the `{ID}` in the following command:
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -adbackup C: -id {ID}
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> The braces `{}` must be included in the ID string.
|
||||
|
||||
---
|
||||
|
||||
## Retrieve Bitlocker recovery keys for a Microsoft Entra joined device
|
||||
|
@ -20,30 +20,30 @@ The BitLocker Control Panel applet allows users to perform basic tasks such as t
|
||||
|
||||
This article describes the BitLocker management tools and how to use them, providing practical examples.
|
||||
|
||||
### BitLocker PowerShell module
|
||||
## BitLocker PowerShell module
|
||||
|
||||
The BitLocker PowerShell module enables administrators to integrate BitLocker options into existing scripts with ease. For a list of cmdlets included in module, their description and syntax, che the [BitLocker PowerShell reference article](/powershell/module/bitlocker).
|
||||
|
||||
### BitLocker drive encryption tools
|
||||
## BitLocker drive encryption tools
|
||||
|
||||
The BitLocker drive encryption tools include the two command-line tools:
|
||||
|
||||
- *Configuration Tool* (`manage-bde.exe`) can be used for scripting BitLocker operations, offering options that aren't present in the BitLocker Control Panel applet. For a complete list of the `manage-bde.exe` options, see the [Manage-bde reference](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/ff829849(v=ws.11))
|
||||
- *Repair Tool* (`repair-bde.exe`) is useful for disaster recovery scenarios, in which a BitLocker protected drive can't be unlocked normally or using the recovery console
|
||||
|
||||
### BitLocker Control Panel applet
|
||||
## BitLocker Control Panel applet
|
||||
|
||||
Encrypting volumes with the BitLocker Control Panel (select **Start**, enter `BitLocker`, select **Manage BitLocker**) is how many users will use BitLocker. The name of the BitLocker Control Panel applet is *BitLocker Drive Encryption*. The applet supports encrypting operating system, fixed data, and removable data volumes. The BitLocker Control Panel organizes available drives in the appropriate category based on how the device reports itself to Windows. Only formatted volumes with assigned drive letters appear properly in the BitLocker Control Panel applet.
|
||||
|
||||
To start encryption for a volume, select **Turn on BitLocker** for the appropriate drive to initialize the **BitLocker Drive Encryption Wizard**. **BitLocker Drive Encryption Wizard** options vary based on volume type (operating system volume or data volume).
|
||||
|
||||
#### OneDrive option
|
||||
### OneDrive option
|
||||
|
||||
There's an option for storing the BitLocker recovery key using OneDrive. This option requires that computers aren't members of a domain and that the user is using a Microsoft Account. Local user accounts don't have the option to use OneDrive. Using the OneDrive option is the default recommended recovery key storage method for computers that aren't joined to a domain.
|
||||
|
||||
Users can verify whether the recovery key is saved properly by checking OneDrive for the *BitLocker* folder, which is created automatically during the save process. The folder contains two files, a `readme.txt` and the recovery key. For users storing more than one recovery password on their OneDrive, they can identify the required recovery key by looking at the file name. The recovery key ID is appended to the end of the file name.
|
||||
|
||||
#### Using BitLocker within Windows Explorer
|
||||
### Use BitLocker within Windows Explorer
|
||||
|
||||
Windows Explorer allows users to launch the **BitLocker Drive Encryption Wizard** by right-clicking a volume and selecting **Turn On BitLocker**. This option is available on client computers by default. On servers, the BitLocker feature and the Desktop-Experience feature must first be installed for this option to be available. After selecting **Turn on BitLocker**, the wizard works exactly as it does when launched using the BitLocker Control Panel.
|
||||
|
||||
@ -456,7 +456,7 @@ Some configuration changes may require to suspend BitLocker and then resume it a
|
||||
|
||||
Follow the instructions below to suspend and resume BitLocker, selecting the option that best suits your needs.
|
||||
|
||||
#### Suspend BitLocker
|
||||
### Suspend BitLocker
|
||||
|
||||
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
||||
|
||||
@ -478,7 +478,7 @@ From the **BitLocker Drive Encryption** Control Panel applet, select the OS driv
|
||||
|
||||
---
|
||||
|
||||
#### Resume BitLocker
|
||||
### Resume BitLocker
|
||||
|
||||
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
||||
|
||||
@ -498,6 +498,91 @@ From the **BitLocker Drive Encryption** Control Panel applet, select the OS driv
|
||||
|
||||
---
|
||||
|
||||
## Reset and backup a recovery password
|
||||
|
||||
It's recommended to invalidate a recovery password after its use. In this example the recovery password protector is removed from the OS drive, a new protector added, and backed up to Microsoft Entra ID or Active Direcroty.
|
||||
|
||||
#### [:::image type="icon" source="images/powershell.svg"::: **PowerShell**](#tab/powershell)
|
||||
|
||||
Remove all recovery passwords from the OS volume:
|
||||
|
||||
```PowerShell
|
||||
(Get-BitLockerVolume -MountPoint $env:SystemDrive).KeyProtector | `
|
||||
where-object {$_.KeyProtectorType -eq 'RecoveryPassword'} | `
|
||||
Remove-BitLockerKeyProtector -MountPoint $env:SystemDrive
|
||||
```
|
||||
|
||||
Add a BitLocker recovery password protector for the OS volume:
|
||||
|
||||
```PowerShell
|
||||
Add-BitLockerKeyProtector -MountPoint $env:SystemDrive -RecoveryPasswordProtector
|
||||
```
|
||||
|
||||
Obtain the ID of the new recovery password:
|
||||
|
||||
```PowerShell
|
||||
(Get-BitLockerVolume -mountpoint $env:SystemDrive).KeyProtector | where-object {$_.KeyProtectorType -eq 'RecoveryPassword'} | ft KeyProtectorId,RecoveryPassword
|
||||
```
|
||||
|
||||
Copy the ID of the recovery password from the output.
|
||||
|
||||
Backup the BitLocker recovery password to Microsoft Entra ID.
|
||||
|
||||
> [!NOTE]
|
||||
>This step is not required if the policy setting [Choose how BitLocker-protected operating system drives can be recovered](configure.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) is configured to **Require BitLocker backup to AD DS**.
|
||||
|
||||
Using the GUID from the previous step, replace the `{ID}` in the following command:
|
||||
|
||||
```PowerShell
|
||||
BackuptoAAD-BitLockerKeyProtector -MountPoint $env:SystemDrive -KeyProtectorId "{ID}"
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> The braces `{}` must be included in the ID string.
|
||||
|
||||
#### [:::image type="icon" source="images/cmd.svg"::: **Command Prompt**](#tab/cmd)
|
||||
|
||||
Remove all recovery passwords from the OS volume:
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -delete C: -type RecoveryPassword
|
||||
```
|
||||
|
||||
Add a BitLocker recovery password protector for the OS volume:
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -add C: -RecoveryPassword
|
||||
```
|
||||
|
||||
Obtain the ID of the new recovery password:
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -get C: -Type RecoveryPassword
|
||||
```
|
||||
|
||||
Copy the ID of the recovery password from the output.
|
||||
|
||||
Backup the BitLocker recovery password to Microsoft Entra ID.
|
||||
|
||||
> [!NOTE]
|
||||
>This step is not required if the policy setting [Choose how BitLocker-protected operating system drives can be recovered](configure.md?tabs=os#choose-how-bitlocker-protected-operating-system-drives-can-be-recovered) is configured to **Require BitLocker backup to AD DS**.
|
||||
|
||||
Using the GUID from the previous step, replace the `{ID}` in the following command:
|
||||
|
||||
```cmd
|
||||
manage-bde.exe -protectors -adbackup C: -id {ID}
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> The braces `{}` must be included in the ID string.
|
||||
|
||||
|
||||
#### [:::image type="icon" source="images/controlpanel.svg"::: **Control Panel**](#tab/controlpanel)
|
||||
|
||||
This process can't be accomplished using the Control Panel. Use one of the other options instead.
|
||||
|
||||
---
|
||||
|
||||
## Disable BitLocker
|
||||
|
||||
Disabling BitLocker decrypts and removes any associated protectors from the volumes. Decryption should occur when protection is no longer required, and not as a troubleshooting step.
|
||||
@ -537,3 +622,10 @@ BitLocker decryption using the Control Panel is done using a wizard. After openi
|
||||
Once decryption is complete, the drive updates its status in the Control Panel and becomes available for encryption.
|
||||
|
||||
---
|
||||
|
||||
## Next steps
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> Learn how to plan for BitLocker recovery deployment in your organization:
|
||||
>
|
||||
> [BitLocker planning guide >](planning-guide.md)
|
||||
|
@ -9,14 +9,6 @@ items:
|
||||
href: configure.md
|
||||
- name: BitLocker operations guide
|
||||
href: operations-guide.md
|
||||
- name: How-to guides
|
||||
items:
|
||||
- name: Install BitLocker on Windows Server
|
||||
href: install-server.md
|
||||
- name: Configure Network Unlock
|
||||
href: network-unlock.md
|
||||
- name: Protect cluster shared volumes and storage area networks
|
||||
href: csv-san.md
|
||||
- name: BitLocker recovery guide
|
||||
items:
|
||||
- name: Overview of BitLocker recovery methods
|
||||
@ -27,6 +19,15 @@ items:
|
||||
href: preboot-recovery-screen.md
|
||||
- name: BitLocker repair tool
|
||||
href: recovery-guide-repair-tool.md
|
||||
- name: How-to guides
|
||||
items:
|
||||
- name: Install BitLocker on Windows Server
|
||||
href: install-server.md
|
||||
- name: Configure Network Unlock
|
||||
href: network-unlock.md
|
||||
- name: Protect cluster shared volumes and storage area networks
|
||||
href: csv-san.md
|
||||
|
||||
- name: BCD settings
|
||||
href: bcd-settings-and-bitlocker.md
|
||||
- name: Frequently asked questions (FAQ)
|
||||
|
Reference in New Issue
Block a user